Related Questions
What is the correct answer?
4
Which of the following is /are offered by the Hash functions?
What is the correct answer?
4
Encryption algorithms are divided into two categories based on the ______.
D. All of the mentioned above
What is the correct answer?
4
Which of the following cipher techniques include the involvement of matrix operations in their algorithms of encryption and decryption?
What is the correct answer?
4
_____ ciphers encrypt uniformly sized blocks of data.
D. All of the mentioned above
What is the correct answer?
4
Conventional cryptography also known as ... encryption.
What is the correct answer?
4
Which of the following is the main disadvantage of the ECB (Electronic Code Book)?orWhich of the following is the major drawback of ECB?
A. It requires large block size
B. Padding is done to make the plain text divisible into blocks of fixed size
C. It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
What is the correct answer?
4
Post-Quantum Cryptography is a classical cryptographic scheme that is conjectured to be secure against ____.
D. None of the mentioned above
What is the correct answer?
4
A cryptographic hash function is an equation used to verify the ____ of data.
D. None of the mentioned above
What is the correct answer?
4
You are supposed to use hill cipher for encryption technique. You are provided with the following matrix,
Is the given matrix 'A', a valid key to be used for encryption?
What is the correct answer?
4
Which is the cryptographic protocol that is used to protect an HTTP connection?
A. Resource reservation protocol
What is the correct answer?
4
ElGamal encryption system is an asymmetric key encryption algorithm.
A. Public-key cryptography
B. Private-key cryptography
What is the correct answer?
4
International Data Encryption Algorithm (IDEA) was developed by
A. Xuejia Lai and James Massey
B. Xuejia Lai and Bruce Schneier
C. Xuejia Lai and Carlisle Adams
D. Xuejia Lai and Stafford Tavares
What is the correct answer?
4
Amongst which of the following is /are good for Hashes,
B. Data integrity / file verification
C. Digital signatures and virus signatures
D. All of the mentioned above
What is the correct answer?
4
In Cipher block chaining mode, the current plaintext block is added to the ____.
A. Previous ciphertext block
C. Middle ciphertext block
D. None of the mentioned above
What is the correct answer?
4
When a hash function is used to provide message authentication, the hash function value is called to as:
What is the correct answer?
4
_____ and ______ protocol models can be extended to Entangled particles theory.
What is the correct answer?
4
Which of the following modes of operations can be followed for both stream ciphers as well as block ciphers?
A. CBC (Cipher Block Chaining)
B. ECB (Electronic Code Book)
C. CFB (Cipher text Feed Back)
What is the correct answer?
4
To encrypt the plaintext, a cryptographic algorithm works in combination with a key...
A. Word, number, or phrase
What is the correct answer?
4
Cipher in cryptography is
B. Algorithm for performing encryption and decryption
C. Both algorithm for performing encryption and decryption and encrypted message
What is the correct answer?
4
The greatest threat is to public cryptography or asymmetric algorithms used for ____.
A. Digital signatures and
D. None of the mentioned above
What is the correct answer?
4
In the case of symmetric key encryption, the secret key that both the parties possess can be anything such as a _______.
A. Passcode or a password
D. None of the mentioned above
What is the correct answer?
4
A hash function is a _____ that converts a numerical input value into another compressed numerical value.
D. None of the mentioned above
What is the correct answer?
4
With reference to Cipher Feedback (CFB) Mode, amongst which of the following is /are true,
A. Each ciphertext block gets 'fed back' into the encryption process
B. Encrypt the next plaintext block
D. None of the mentioned above
What is the correct answer?
4
Data encryption standard is a block cipher and encrypts data in blocks of size of _____ each.
D. All of the mentioned above
What is the correct answer?
4
With symmetric key algorithms, the ____ key is used for the encryption and decryption of data.
D. None of the mentioned above
What is the correct answer?
4
When do we compare the AES with DES, which of the following functions from DES does not have an equivalent AES function in cryptography?
D. xor of subkey with function f
What is the correct answer?
4
Which of the following ciphers is a block cipher?
What is the correct answer?
4
Amongst which of the following is/ are true with reference to step-by-step breakdown of the process of quantum cryptography,
A. The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment
B. Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon
C. Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent
D. All of the mentioned above
What is the correct answer?
4
How many elements are used in cryptography tools?
What is the correct answer?
4
Block ciphers accumulate symbols in a message of a ______.
D. All of the mentioned above